Forensic Computing. Digital Evidence for Case Preparations

Size: px
Start display at page:

Download "Forensic Computing. Digital Evidence for Case Preparations"

Transcription

1 Forensic Computing Digital Evidence for Case Preparations In 1965 Gordon Moore wrote in Electronics Magazine 1 his theory on the potential for computational evolution increasing at a factored rate of double per year. Whilst his law has since been tempered based on actual industry development life-cycles, his prophetic statement still holds largely true and today there is almost no walk of life or industry where computers and information networks have not become deeply integrated and criminals have moved in step with technical advances, discovering ways in which to leverage IT to facilitate the commissioning of offences. In many instances this is old, or conventional crime, perpetrated using new approaches that are reliant on technology. Postal fraud, for instance, has evolved to employ electronic communication channels, giving rise to waves of s seeking to defraud recipients with promises of money and fictitious prizes (commonly known as 419 scams as many of such notes tend to originate from the African continent and 419 is their penal code for wire fraud). Studies into the cost of cyber-crime, commissioned independently by the Department of Trade and Industry (DTI) 2, reveal alarming trends in the abuse and misuse of technology. The average cost per security incident has risen to over 160,000 and nearly one in four businesses in the UK have suffered a serious hacker attack or virus outbreak. The impact of an information security breach can be so devastating to business operations that one in ten never actually recover and the shutters close permanently. To counter this growing threat, security and law enforcement agencies have adopted fresh approaches for dealing with high technology crime. Forensic Computing is a relatively young science when compared to contact forensics such as fingerprint recognition which have roots that can be traced back to Edmond Locard 3, who in the early 1900s famously postulated the theory of evidence being left as mutual exchanges of contact. Whilst various descriptions exist in relation to this practice, the international survey undertaken by Hannen et al., has been taken as the de-facto definition: Processes or procedures involving monitoring, collection, analysis as part of a priori or postmortem investigations of 1 Cramming more components onto Integrated Circuits, Electronics Magazine, 19 April DTI Information Security Breaches Survey 2006: see 3 Dr Edmond Locard, Father of Modern Ridgeology: see The Barrister Magazine AFENTIS Information Assurance Page 1 of 5

2 computer misuse. It is important to appreciate that this definition takes a wider view than the conventional reactive description, where forensics was regarded purely as an incident response function. Hannen et al. consider digital forensics as also taking a pro-active role in security, where it can be combined with intelligence and operational planning. As a serious field of research, forensic computing studies only started to take real form in the early 1990s when, faced with ever increasing numbers of computers being seized at crime scenes and the potential for crucial evidence to be stored on a PC, various government agencies came together to host the International Conference on Computer Evidence (ICCE). Here many of the challenges facing law enforcement communities were aired and agreements forged to cooperate towards finding effective solutions. Two years later, in 1995, the International Organisation for Computer Evidence (IOCE) 4 was formed, and a further two years later the member states that comprise the G8 subscribed to the mission of IOCE, pledging support for the organisation. This was the catalyst required to stimulate research and development, and since then great advances have been made in all spheres of digital evidence management. When working on a matter where the case will rise or fall on the strength of digital evidence, for example where an allegation of possession of indecent images has been made, it is important to commission an independent forensic examination of all evidence and digital materials. This places the evidence into the wider context of the offence and enables barristers to make directions to the court based on a fuller appreciation of matter. Assuming material has been seized by the authorities, the state will usually conduct their own forensic assessments (typically undertaken by the regional police hi-tech crime unit 5 ), the results of which will be provided to legal representations. The mechanics of this process involve the imaging of the target media the process of making a forensically sound duplication of digital materials of interest (e.g. the computer hard drive). During this duplication process a write-blocking device will be employed to ensure the target media is not affected or corrupted in any capacity whilst its content is read and mirrored. The actual forensic analysis is then made upon the duplicated material, with the original placed into secure storage and maintained in the state in which it was seized. The forensic analyst will then peruse the imaged copy to identify materials of potential 4 International Organisation on Computer Evidence (IOCE): see 5 National Hi-Tech Crime Unit (NHTCU): see The Barrister Magazine AFENTIS Information Assurance Page 2 of 5

3 evidence value, extracting copies as necessary to form the basis of the expert report. Looking at this from a defence perspective, a number of questions should be posed in relation to the digital evidence (based on the Daubert threshold test that evaluates the competency of evidence): whether the theories and techniques employed by the scientific expert have been tested; whether they have been subjected to peer review and publication; whether the techniques employed by the expert have a known error rate; whether they are subject to standards governing their application; and whether the theories and techniques employed by the expert enjoy widespread acceptance. Sam Patel, Head of Incident Response at AFENTIS, speaking at a recent legal seminar at the Liverpool Anglican Cathedral said: As the threat landscape has changed, so too have the countermeasures with specialists developing tools to aid in the recovery of sensitive data and to successfully isolate it so as to ensure it can be made admissible in a court of law. Putting abuses of technology on a statutory footing, Britain has a suite of legislation that can be invoked, from the Computer Misuse Act to the Regulation of Investigatory Powers Act Today digital forensics is an accepted science, and evidence duly secured in relation to best practices (in the UK these guidelines are outlined by the Association of Chief Police Officers) can be served in a court of law. Digital forensics are providing breakthroughs in all manner of high profile cases around the world, helping security and law enforcement agencies to catch offenders and secure convictions. In the US, for example, the notorious BTK serial killer that had a reign of terror lasting over twenty five years in the Wichita areas, was ultimately tracked down after he sent a disk to a local radio station gloating at the police s inability to catch him. Unique digital footprints embedded within the files were extracted by forensic specialists, and like a lone fingerprint, investigators now had a powerful lead all they needed was to match the file to the computer that had created it (much like having a 6 Computer Misuse Act 1990: see 7 Regulation of Investigatory Power Act 2000: see The Barrister Magazine AFENTIS Information Assurance Page 3 of 5

4 fingerprint but not a suspect s hand to match it with). Wichita Police then conducted a house to house search, taking file samples from every computer encountered. Back in the laboratory, the file footprints were compared to the sample disk posted by the BTK killer, eventually finding a match. This tied the floppy disk to Dennis Radar s PC, a virtual smoking gun as far the prosecution were concerned. This digital evidence became a pivotal element of the State s case and ultimately helped secure a conviction. In the UK the 2002 murders of Holly Wells and Jessica Chapman in Soham, Cambridgeshire, also saw digital forensics play a crucial, but largely unknown, role in the investigation. Technical analysts examined one of the girl s mobile phone to identify where it was located when it had been turned off. Information on the nearest network communication tower tends to be stored in a phone s memory and when the signal coverage of that tower is plotted, it is possible to identify the rough area (typically a few square kilometres) in which the phone was located when it was switched off. Having extracted this information from the handset, authorities had a rough idea of where to base their search; which ultimately led to the recovery of the two girl s bodies. Speaking in an interview several years after his pioneering research on the Manhattan Project 8 where atomic reaction theory was developed, scientific visionary Oppenheimer explained that the scientist is free to ask any question, to doubt any assertion, to seek for any evidence. This thinking holds especially true when applied to the discipline of forensic computing in a legal context. Here experts may be instructed by either the prosecution or the defence, however, in either instance, they have a higher duty to the court. They are instructed as experts, but experts for the truth. It is important therefore to ensure that the experts instructed are duly qualified, experienced and independent. Commenting on the nature of digital evidence, John Brown, Partner at Hogan Brown Solicitors, explained how the fragile nature of digital evidence can pose serious challenges to the investigator: digital material is extremely volatile perhaps more delicate than its physical counterparts. It can be copied, amended, and transferred without almost any trace only experienced and qualified specialists should be employed to work in a digital forensic environment if the subsequent findings are to withstand the scrutiny of a court of law. When working on a matter where the case will rise or fall on the strength of the digital evidence, perhaps where an allegation of possession of indecent images 8 Manhattan Project: see The Barrister Magazine AFENTIS Information Assurance Page 4 of 5

5 has been made, it is important to commission an independent forensic examination of all evidence and digital materials. Forensic computing and the securing of digital evidence is a powerful tool in today s fight against increasingly technically-savvy criminals. It is a discipline that continues to evolve and should remain high on the radar for both legal practitioners and law enforcement authorities. AFENTIS - Expert analysis of mobile telephones, computer systems and all aspects of digital evidence. AFENTIS runs frequent briefings across the UK on the changing face of technology and IT-related legislation. To find out more visit: or contact Diana Allan on or via diana.allan@afentis.com The Barrister Magazine AFENTIS Information Assurance Page 5 of 5

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones School of Computing and

More information

2 LEADING IN THE NEW IN PUBLIC SAFETY

2 LEADING IN THE NEW IN PUBLIC SAFETY Disruption is creating a new operating environment for public safety agencies: new threats, a need to identify, risk and harm from volume, meet increasing citizen expectation, to create new ecosystems,

More information

THE VERY BRIEF HISTORY OF DIGITAL. Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC

THE VERY BRIEF HISTORY OF DIGITAL. Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC THE VERY BRIEF HISTORY OF DIGITAL EVIDENCE STANDARDS Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC Abstract: Key words: This paper will trace

More information

To Revisit: What is Forensic Computing?

To Revisit: What is Forensic Computing? To Revisit: What is Forensic Computing? MATHEW HANNAN Researcher University of South Australia, Adelaide, South Australia mathew.hannan@unisa.edu.au +61883029047 PhD Candidate University of Tasmanian,

More information

UK Research and Innovation. Counter Fraud and Bribery Policy

UK Research and Innovation. Counter Fraud and Bribery Policy UK Research and Innovation Counter Fraud and Bribery Policy Contents: Policy Statement 1. Introduction and Purpose Endorsement 2. Policy Review 3. Principles - What are Fraud, Bribery and Cybercrime 4.

More information

Bats and the Law An overview for planning, building and maintenance works

Bats and the Law An overview for planning, building and maintenance works Bats and the Law An overview for planning, building and maintenance works Bats and their roosts are legally protected. In most cases works can take place as long as you plan ahead and follow certain rules.

More information

Contact with the media

Contact with the media Contact with the media Support for survivors of sexual offences How we can help and about this guidance We are the Independent Press Standards Organisation (IPSO), the independent regulator of most of

More information

ONR Strategy 2015 to 2020

ONR Strategy 2015 to 2020 Title of publication ONR Strategy 2015 to 2020 Office for Nuclear Regulation Page 1 of 5 Introduction Nick Baldwin, Chair The Energy Act 2013 provided for the creation of ONR as an independent, statutory

More information

Anonymous registration: Supporting survivors of domestic abuse to register to vote

Anonymous registration: Supporting survivors of domestic abuse to register to vote Anonymous registration: Supporting survivors of domestic abuse to register to vote April 2018 Produced in partnership between the Electoral Commission and Scottish Women s Aid This leaflet reflects the

More information

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer. Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information

Health & Safety Policy Statement

Health & Safety Policy Statement Health & Safety Policy Statement NHS Portsmouth Clinical Commissioning Group (CCG) attaches great importance to the Health and Safety of its staff, and recognises its legal obligations under the Health

More information

19 and 20 November 2018 RC-4/DG.4 15 November 2018 Original: ENGLISH NOTE BY THE DIRECTOR-GENERAL

19 and 20 November 2018 RC-4/DG.4 15 November 2018 Original: ENGLISH NOTE BY THE DIRECTOR-GENERAL OPCW Conference of the States Parties Twenty-Third Session C-23/DG.16 19 and 20 November 2018 15 November 2018 Original: ENGLISH NOTE BY THE DIRECTOR-GENERAL REPORT ON PROPOSALS AND OPTIONS PURSUANT TO

More information

Wise Up to Counterfeiting

Wise Up to Counterfeiting Wise Up to Counterfeiting A GUIDE FOR POLICE OFFICERS www.bankofcanada.ca/banknotes With the introduction of polymer bank notes in 2011, the Bank of Canada s message is clear it intends to stay ahead of

More information

Research and Innovation. Roadmap

Research and Innovation. Roadmap Research and Innovation Roadmap 2017-2020 About NIFS The National Institute of Forensic Science (NIFS) is a directorate within the Australia New Zealand Policing Advisory Agency (ANZPAA). Our strategic

More information

I also want to thank you, Jack, and everyone for the significant contributions you make every day to NGA s success.

I also want to thank you, Jack, and everyone for the significant contributions you make every day to NGA s success. Letitia A. Long Director, National Geospatial-Intelligence Agency Esri Federal GIS Conference Washington Convention Center, Washington, DC February 11, 2014, 0945-1015 (20-25 min keynote, 5-10 min Q&A

More information

RESEARCH AND INNOVATION STRATEGY. ANZPAA National Institute of Forensic Science

RESEARCH AND INNOVATION STRATEGY. ANZPAA National Institute of Forensic Science RESEARCH AND INNOVATION STRATEGY ANZPAA National Institute of Forensic Science 2017-2020 0 CONTENTS INTRODUCTION... 3 PURPOSE... 4 STRATEGY FOUNDATION... 5 NEW METHODS AND TECHNOLOGY... 5 ESTABLISHED METHODS

More information

ANZPAA National Institute of Forensic Science BUSINESS PLAN

ANZPAA National Institute of Forensic Science BUSINESS PLAN ANZPAA National Institute of Forensic Science BUSINESS PLAN 2016 2017 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate

More information

OMCL Network of the Council of Europe GENERAL DOCUMENT

OMCL Network of the Council of Europe GENERAL DOCUMENT OMCL Network of the Council of Europe GENERAL DOCUMENT PA/PH/OMCL (09) 87 4R OMCL Network support for the implementation of the CoE MEDICRIME Convention Full document title and reference How the OMCL Network

More information

Justice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland

Justice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland Justice Sub-Committee on Policing Police Scotland s digital data and ICT strategy Written submission from Police Scotland The following information is provided for information of the Justice Sub-Committee.

More information

Unit 2: THE CRIME SCENE

Unit 2: THE CRIME SCENE Unit 2: THE CRIME SCENE Oh, how simple it would all have been had I been here before they came like a herd of buffalo and wallowed all over it. A. Conan Doyle, in The Boscombe Valley Mystery, 1892 CORPUS

More information

Introduction and Use of this Text List of Contributors About the Companion Website. PART I Crime Scene Principles 1

Introduction and Use of this Text List of Contributors About the Companion Website. PART I Crime Scene Principles 1 Introduction and Use of this Text List of Contributors About the Companion Website PART I Crime Scene Principles 1 1 The Crime Scene Context 3 Raul Sutton 1.1 Introduction 3 1.2 What is a crime? 4 1.3

More information

Crime Scene Management: Scene Specific Methods

Crime Scene Management: Scene Specific Methods Brochure More information from http://www.researchandmarkets.com/reports/992036/ Crime Scene Management: Scene Specific Methods Description: Crime Scene Management: Scene Specific Methods is an accessible

More information

Robert J. Cleary. Proskauer.com. Partner. New York

Robert J. Cleary. Proskauer.com. Partner. New York Contact Robert J. Cleary Partner New York +1.212.969.3340 rjcleary@proskauer.com Bob Cleary is the immediate past co-chair of Proskauer s Litigation Department, a former member of the Firm s Executive

More information

Criminal CV Overview. Clerks Details. Education. Beyond the Bar. Call 1994

Criminal CV Overview. Clerks Details. Education. Beyond the Bar. Call 1994 Sean Smith Call 1994 Clerks Details Kate Heald 0113 203 1983 Ian Spencer 0113 203 1971 Education Nottingham Trent University (1989 1993) - Bachelor of Laws (LL.B.), 2:1 The College of Law, London (1993

More information

Ethics and technology

Ethics and technology Professional accountants the future: Ethics and technology International Ethics Standards Board for Accountants (IESBA) 19 June 2018 Agenda ACCA Professional Insights (PI) and technology Technology impact

More information

Our Corporate Strategy Digital

Our Corporate Strategy Digital Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital

More information

International Forensic Services

International Forensic Services International Forensic Services Right People. Delivering Results. Experienced scientists delivering forensic effectiveness, unquestionable integrity, focused customer service and value for money. Strengthening

More information

Australia and the European Union: an agenda for cooperation

Australia and the European Union: an agenda for cooperation Australia and the European Union: an agenda for cooperation Australia and the European Union: an agenda for future cooperation The 1997 Joint Declaration on Relations between Australia and the European

More information

DIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES

DIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES DIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES Produced by Sponsored by JUNE 2016 Contents Introduction.... 3 Key findings.... 4 1 Broad diversity of current projects and maturity levels

More information

Media Literacy Policy

Media Literacy Policy Media Literacy Policy ACCESS DEMOCRATIC PARTICIPATE www.bai.ie Media literacy is the key to empowering people with the skills and knowledge to understand how media works in this changing environment PUBLIC

More information

This version has been archived. Find the current version at on the Current Documents page. Scientific Working Groups on.

This version has been archived. Find the current version at  on the Current Documents page. Scientific Working Groups on. Scientific Working Groups on Digital Evidence and Imaging Technology SWGDE/SWGIT Guidelines & Recommendations for Training in Digital & Multimedia Evidence Disclaimer: As a condition to the use of this

More information

THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK

THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK I. Ademu 1, C. Imafidon 2 1 Postgraduate Student, School of Architecture, Computing and Engineering, University of East London, London, United Kingdom,

More information

MCPI Annual Conference Tuesday, September 19, 2017

MCPI Annual Conference Tuesday, September 19, 2017 Michigan Council of Professional Investigators MCPI Annual Conference Tuesday, September 19, 2017 Location: Cleary University, 3750 Cleary Drive, Howell, MI 48843 Time 8:45am 9:00am 9:00am 9:45am 9:45am

More information

The Nagoya Protocol: Compliance. Implications of the E.U. law for Microbiologists

The Nagoya Protocol: Compliance. Implications of the E.U. law for Microbiologists The Nagoya Protocol: Compliance Implications of the E.U. law for Microbiologists 1 Nagoya Protocol Compliance In this talk I will outline: The role of compliance How developed countries will respond The

More information

A DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS

A DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS A DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS Jock Forrester and Barry Irwin (CISSP) SNRG Department of Computer Science Hamilton Building, Rhodes University, Grahamstown, 6139 Email:

More information

How to complete the Tier 4 (General) Student visa application online

How to complete the Tier 4 (General) Student visa application online How to complete the Tier 4 (General) Student visa application online Have you attended a Preparing your Tier 4 visa application presentation hosted each month by the International Support Team? It explains

More information

Over the 10-year span of this strategy, priorities will be identified under each area of focus through successive annual planning cycles.

Over the 10-year span of this strategy, priorities will be identified under each area of focus through successive annual planning cycles. Contents Preface... 3 Purpose... 4 Vision... 5 The Records building the archives of Canadians for Canadians, and for the world... 5 The People engaging all with an interest in archives... 6 The Capacity

More information

EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC)

EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) Strasbourg, 10 March 2019 EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) Working Group of Experts on Artificial Intelligence and Criminal Law WORKING PAPER II 1 st meeting, Paris, 27 March 2019 Document prepared

More information

Australian Census 2016 and Privacy Impact Assessment (PIA)

Australian Census 2016 and Privacy Impact Assessment (PIA) http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,

More information

Re: Examination Guideline: Patentability of Inventions involving Computer Programs

Re: Examination Guideline: Patentability of Inventions involving Computer Programs Lumley House 3-11 Hunter Street PO Box 1925 Wellington 6001 New Zealand Tel: 04 496-6555 Fax: 04 496-6550 www.businessnz.org.nz 14 March 2011 Computer Program Examination Guidelines Ministry of Economic

More information

Office for Nuclear Regulation Strategy

Office for Nuclear Regulation Strategy Office for Nuclear Regulation Strategy 2015 to 2020 Office for Nuclear Regulation page 1 of 12 Office for Nuclear Regulation page 2 of 12 Office for Nuclear Regulation Strategy 2015 to 2020 Presented to

More information

Last week a long-time friend asked what type of law I practice. I was surprised that he didn t know what I do for a

Last week a long-time friend asked what type of law I practice. I was surprised that he didn t know what I do for a Hello, everyone, and welcome to my first ever office newsletter. As you can tell, I studied law and not graphic design, but hopefully you will still find the information in this message to be helpful!

More information

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview Challenging the Situational Awareness on the Sea from Sensors to Analytics New technologies for data gathering, dissemination, sharing and analytics in the Mediterranean theatre Programme Overview The

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best

More information

INQUESTS A FACTSHEET FOR FAMILIES

INQUESTS A FACTSHEET FOR FAMILIES INQUESTS A FACTSHEET FOR FAMILIES This is a brief introduction as to what to expect at an Inquest and designed to give an overview about the purpose and process of a Coroner's Inquest. More detailed information

More information

ARAMINTA FREEDOM INITIATIVE

ARAMINTA FREEDOM INITIATIVE ARAMINTA FREEDOM INITIATIVE Volunteer Memorandum of Understanding Dear Araminta Freedom Initiative Volunteer, On behalf of the leadership of Araminta Freedom Initiative, we want to welcome you as one of

More information

MILITARY RADAR TRENDS AND ANALYSIS REPORT

MILITARY RADAR TRENDS AND ANALYSIS REPORT MILITARY RADAR TRENDS AND ANALYSIS REPORT 2016 CONTENTS About the research 3 Analysis of factors driving innovation and demand 4 Overview of challenges for R&D and implementation of new radar 7 Analysis

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the

More information

IP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018

IP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018 ANNUAL WORK PLAN FOR 2018 IP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018 IP Key South East Asia is an EU Project designed to support the Free Trade Agreement (FTA) talks and Intellectual Property Dialogues

More information

CSCM World Congress on CBRNe Science and Consequence Management. Remarks by Ahmet Üzümcü, Director-General OPCW. Monday 2 June 2014 Tbilisi, Georgia

CSCM World Congress on CBRNe Science and Consequence Management. Remarks by Ahmet Üzümcü, Director-General OPCW. Monday 2 June 2014 Tbilisi, Georgia 1 CSCM World Congress on CBRNe Science and Consequence Management Remarks by Ahmet Üzümcü, Director-General OPCW Monday 2 June 2014 Tbilisi, Georgia H.E. the Minister of Internal Affairs, H.E. the Minister

More information

The creation of the Emergency Preparedness and Response Expert Group (EPREG) which held its second meeting last month.

The creation of the Emergency Preparedness and Response Expert Group (EPREG) which held its second meeting last month. Remarks at SENIOR REGULATORS MEETING 19 September 2013 Good morning, Ladies and Gentlemen. I am pleased to welcome you to this meeting of Senior Regulators, which is an annual feature of the IAEA General

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT The template below is designed to assist you in carrying out a privacy impact assessment (PIA). Privacy Impact Assessment screening questions These questions

More information

Gender pay gap reporting tight for time

Gender pay gap reporting tight for time People Advisory Services Gender pay gap reporting tight for time March 2018 Contents Introduction 01 Insights into emerging market practice 02 Timing of reporting 02 What do employers tell us about their

More information

DEVON & CORNWALL C O N S T A B U L A R Y

DEVON & CORNWALL C O N S T A B U L A R Y DEVON & CORNWALL C O N S T A B U L A R Y Force Policy & Procedure Guideline EVIDENTIAL DIGITAL IMAGING Reference Number D296 Policy Version Date 17 November 2010 Review Date 01 April 2015 Policy Ownership

More information

IN THE CIRCUIT COURT OF THE ELEVENTH JUDICIAL CIRCUIT IN AND FOR MIAMI-DADE COUNTY, FLORIDA AFFIDAVIT IN SUPPORT OF ARREST WARRANT

IN THE CIRCUIT COURT OF THE ELEVENTH JUDICIAL CIRCUIT IN AND FOR MIAMI-DADE COUNTY, FLORIDA AFFIDAVIT IN SUPPORT OF ARREST WARRANT IN THE CIRCUIT COURT OF THE ELEVENTH JUDICIAL CIRCUIT IN AND FOR MIAMI-DADE COUNTY, FLORIDA IN RE: APPLICATION FOR ARREST WARRANT FOR: KARL BLAINE ALDERMAN AFFIDAVIT IN SUPPORT OF ARREST WARRANT BEFORE

More information

FALSE PROMISE. That high-value prospect could be a synthetic identity

FALSE PROMISE. That high-value prospect could be a synthetic identity FALSE PROMISE That high-value prospect could be a synthetic identity An abstract from the LexisNexis Risk Solutions 2018 State of Risk in Communications, Mobile & Media YOU KNOW WHAT YOU'RE UP AGAINST

More information

THE USE OF A SAFETY CASE APPROACH TO SUPPORT DECISION MAKING IN DESIGN

THE USE OF A SAFETY CASE APPROACH TO SUPPORT DECISION MAKING IN DESIGN THE USE OF A SAFETY CASE APPROACH TO SUPPORT DECISION MAKING IN DESIGN W.A.T. Alder and J. Perkins Binnie Black and Veatch, Redhill, UK In many of the high hazard industries the safety case and safety

More information

the Companies and Intellectual Property Commission of South Africa (CIPC)

the Companies and Intellectual Property Commission of South Africa (CIPC) organized by the Companies and Intellectual Property Commission of South Africa (CIPC) the World Intellectual Property Organization (WIPO) the International Criminal Police Organization (INTERPOL) the

More information

STEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS

STEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS Active Shooter Management It s now part of our reality that we must consider what to do if we were to be caught in an active shooter event. Although knowing how to run, hide or fight might be quite useful

More information

TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES

TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES Trilateral Research Ltd. Crown House 72 Hammersmith Road W14 8TH, London + 44 (0)20 7559 3550 @Trilateral_UK

More information

The Internet of Things And what it mean for librarians

The Internet of Things And what it mean for librarians The Internet of Things And what it mean for librarians Lee Rainie Pew Research Center Internet Project Presented to: Internet Librarian October 28, 2014 Oxford English Dictionary Internet of things: Development

More information

The future of the legal profession survey

The future of the legal profession survey The future of the legal profession survey conducted by AIJA in collaboration with the Council of Bars and Law Societies in Europe, September October 2018 Contents Methodology Executive summary Top findings

More information

Standards in. International Trade & Nuclear Safety. The Role of IAEA

Standards in. International Trade & Nuclear Safety. The Role of IAEA The Role of Standards in International Trade & Nuclear Safety IAEA International Atomic Energy Agency International Atomic Energy Agency Technical Meeting on Shared Experiences and Lessons Learned from

More information

Anti cheating guidelines for Arbiters

Anti cheating guidelines for Arbiters Annex 19B Anti cheating guidelines for Arbiters (These guidelines shall be included in the subjects and will be taught in all Workshops, FIDE Arbiters Seminars and Courses for International and FIDE Arbiters).

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

Developing the Arts in Ireland. Arts Council Strategic Overview

Developing the Arts in Ireland. Arts Council Strategic Overview Developing the Arts in Ireland Arts Council Strategic Overview 2011 2013 1 Mission Statement The mission of the Arts Council is to develop the arts by supporting artists of all disciplines to make work

More information

Privacy Impact Assessment on use of CCTV

Privacy Impact Assessment on use of CCTV Appendix 2 Privacy Impact Assessment on use of CCTV CCTV is currently in the majority of the Council s leisure facilities, however this needs to be extended to areas not currently covered by CCTV. Background

More information

Image: alexaldo. Report The role of digital technology in tackling modern slavery Monday 12 Wednesday 14 June 2017 WP1546. In association with:

Image: alexaldo. Report The role of digital technology in tackling modern slavery Monday 12 Wednesday 14 June 2017 WP1546. In association with: Image: alexaldo Report The role of digital technology in tackling modern slavery Monday 12 Wednesday 14 June 2017 WP1546 In association with: Report The role of digital technology in tackling modern slavery

More information

IN THE CIRCUIT COURT OF THE SEVENTEENTH JUDICIAL CIRCUIT IN AND FOR BROWARD COUNTY, FLORIDA

IN THE CIRCUIT COURT OF THE SEVENTEENTH JUDICIAL CIRCUIT IN AND FOR BROWARD COUNTY, FLORIDA IN THE CIRCUIT COURT OF THE SEVENTEENTH JUDICIAL CIRCUIT IN AND FOR BROWARD COUNTY, FLORIDA AFFIDAVIT IN SUPPORT OF ARREST WARRANT BEFORE ME,, Judge of the Circuit Court, in and for Broward County, Florida,

More information

For consideration at the Executive Committee meeting on 6 June 2016.

For consideration at the Executive Committee meeting on 6 June 2016. Paper Number T(16)40 18 May 2016 PAPER CLASSIFICATION: OPEN Board of Trustees GIFTS AND HOSPITALITY POLICY VOLUNTEERS (Paper by Dom Pickersgill, General Counsel. If you have any questions on this paper

More information

COMBINED STORY PLAN FOR A 4-ACT COZY MYSTERY

COMBINED STORY PLAN FOR A 4-ACT COZY MYSTERY Page 1 of 8 COMBINED STORY PLAN FOR A 4-ACT COZY MYSTERY ACT ONE Steps 1 to 4 Step 1. Characters and world building. Introduce the main characters in their story worlds and situations. Start with the sleuth

More information

Digital Forensics Lecture 11. Evidence, Reporting, and Action

Digital Forensics Lecture 11. Evidence, Reporting, and Action Digital Forensics Lecture 11 Evidence, Reporting, and Action This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit Next

More information

PwC s Global Economic Crime Survey 2018: UK findings

PwC s Global Economic Crime Survey 2018: UK findings PwC s Global Economic Crime Survey 2018: UK findings Pulling fraud out of the shadows www.pwc.co.uk/gecs Welcome to the UK results from our 2018 Global Economic Crime Survey (GECS). The findings from this

More information

The Port Marine Safety Code a Harbour Masters Perspective!

The Port Marine Safety Code a Harbour Masters Perspective! The Port Marine Safety Code a Harbour Masters Perspective! A PRESENTATION FOR THE PIANC PORT OPERATIONS SEMINAR, LONDON, 25 TH NOVEMBER 2016 CAPTAIN KEVIN RICHARDSON PRESIDENT INTERNATIONAL HARBOUR MASTERS

More information

Case Study: Patent Attorney - Grahame

Case Study: Patent Attorney - Grahame Case Study: Patent Attorney - Grahame What do you do? Well, as a patent attorney, I provide a sort of bridge between the technical community and the legal community. I have both qualifications, so if somebody

More information

Emerging Security Challenges Division NATO

Emerging Security Challenges Division NATO NATO Science for Peace and Security (SPS) Programme Workshop on CBRN Defence 22-24 October 2013 Brussels Emerging Security Challenges Division NATO 1 NATO Science for Peace and Security (SPS) Programme

More information

Virtual Crime: Forensic Artefacts from Second Life

Virtual Crime: Forensic Artefacts from Second Life Virtual Crime: Forensic Artefacts from Second Life Sarah Morris Centre for Forensic Computing, Cranfield University, Shrivenham, SN6 8LA S.L.Morris@Cranfield.ac.uk Abstract Second Life is an online virtual

More information

GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT

GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT CRITICAL THINKING AT THE CRITICAL TIME ABOUT US The Global Risk and Investigations Practice (GRIP) of FTI Consulting is the leading provider of

More information

The Disappearing Computer. Information Document, IST Call for proposals, February 2000.

The Disappearing Computer. Information Document, IST Call for proposals, February 2000. The Disappearing Computer Information Document, IST Call for proposals, February 2000. Mission Statement To see how information technology can be diffused into everyday objects and settings, and to see

More information

Consultation Paper on Public Safety Radio Interoperability Guidelines

Consultation Paper on Public Safety Radio Interoperability Guidelines June 2006 Spectrum Management and Telecommunications Consultation Paper on Public Safety Radio Interoperability Guidelines Aussi disponible en français Department of Industry Radiocommunication Act Notice

More information

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection European Parliament 2014-2019 Committee on the Internal Market and Consumer Protection 2018/2088(INI) 7.12.2018 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee

More information

Become a Private Investigator

Become a Private Investigator Get paid to investigate! FabJob Guide to Become a Private Investigator Jennifer James Visit www.fabjob.com Contents About The Authors and Experts...8 1. Introduction...11 1.1 Benefits of the Career...12

More information

COGNITIVE APPROACHES FOR DIGITAL FORENSIC READINESS PLANNING

COGNITIVE APPROACHES FOR DIGITAL FORENSIC READINESS PLANNING Chapter 4 COGNITIVE APPROACHES FOR DIGITAL FORENSIC READINESS PLANNING Antonio Pooe and Les Labuschagne Abstract This paper focuses on the use of cognitive approaches for digital forensic readiness planning.

More information

Towards Solving the Identity Challenge Faced by Digital Forensics

Towards Solving the Identity Challenge Faced by Digital Forensics Towards Solving the Identity Challenge Faced by Digital Forensics A. Valjarevic and H. Venter Department of Computer Science, University of Pretoria e-mail: alexander@vlatacom.com Abstract The importance

More information

Circuit Programme Handbook

Circuit Programme Handbook Circuit Programme Handbook Contents p.3 Introduction p.4 Circuit Values and Aims Circuit team p.5 Circuit Evaluation Circuit Governance Circuit Reporting p.6 Circuit Marketing and Press Circuit Brand p.7

More information

Footwear & Tire Tread Photography A comparison of digital resolution vs. 35mm film

Footwear & Tire Tread Photography A comparison of digital resolution vs. 35mm film Steve Everist, King County Sheriff s Office, WA William Fluit, Sioux Falls Police Department, SD Forensic Photography III, Michael Brooks, January 29, 2007 Footwear & Tire Tread Photography A comparison

More information

800 System Procedures

800 System Procedures Emergency Button Activation: 800 System Procedures All ACFR radios are equipped with emergency button functionality. When this button is activated by the end-user, an audible alarm and a flashing visual

More information

DIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE

DIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE DIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE CP Grobler, Prof B Louwrens University of Johannesburg, Department of Business IT Nedbank, SA talania@uj.ac.za 011 406 3551 buksl@nedbank.co.za 011 294

More information

Handling Digital Photographs for Use in Criminal Trials V2, March 2008

Handling Digital Photographs for Use in Criminal Trials V2, March 2008 Handling Digital Photographs for Use in Criminal Trials V2, March 2008 This is a DRAFT guide that may, once fully developed, be used by law enforcement to help ensure that digital photographs are admissible

More information

Enforcement of Intellectual Property Rights Frequently Asked Questions

Enforcement of Intellectual Property Rights Frequently Asked Questions EUROPEAN COMMISSION MEMO Brussels/Strasbourg, 1 July 2014 Enforcement of Intellectual Property Rights Frequently Asked Questions See also IP/14/760 I. EU Action Plan on enforcement of Intellectual Property

More information

Written response to the public consultation on the European Commission Green Paper: From

Written response to the public consultation on the European Commission Green Paper: From EABIS THE ACADEMY OF BUSINESS IN SOCIETY POSITION PAPER: THE EUROPEAN UNION S COMMON STRATEGIC FRAMEWORK FOR FUTURE RESEARCH AND INNOVATION FUNDING Written response to the public consultation on the European

More information

At the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene

At the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene FORENSIC SCIENCE - BURKS Crime Scene At the Crime Scene Forensic science begins at the crime scene, which can provide useful information that must be carefully, systematically, scientifically, and legally

More information

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016 Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

The Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation

The Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation The Method Toolbox of TA PACITA Summer School 2014 Marie Louise Jørgensen, mlj@tekno.dk The Danish Board of Technology Foundation The TA toolbox Method Toolbox Classes of methods Classic or scientific

More information

Technology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets

Technology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets CASE STUDY Technology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets EXECUTIVE SUMMARY The Joint Research Centre (JRC) is the European Commission's

More information

Chapter 2 A MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT. 1. Introduction. Albert Antwi-Boasiako and Hein Venter

Chapter 2 A MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT. 1. Introduction. Albert Antwi-Boasiako and Hein Venter Chapter 2 A MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT Albert AntwiBoasiako and Hein Venter Abstract Digital evidence is increasingly important in legal proceedings as a result of advances in

More information

DIGITAL FORENSICS LABORATORY

DIGITAL FORENSICS LABORATORY DIGITAL FORENSICS LABORATORY What is digital forensics? First and foremost, you should know that digital data today can be important clue or evidence to support crime investigation or litigation. Digital

More information

TETRA and Critical Communications Association (TCCA) response to Ofcom 700 MHz consultation

TETRA and Critical Communications Association (TCCA) response to Ofcom 700 MHz consultation TETRA + Critical Communications Association 14 Blandford Square Newcastle upon Tyne NE1 4HZ UK Tel: +44 191 231 4328 Fax: +44 191 245 3802 5th July 2013 Dear Sirs, TETRA and Critical Communications Association

More information